<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[New KEV added 🚨CVE-2026-34197 (Apache ActiveMQ)• Active exploitation confirmed• High-risk entry pointKEV = patch now, not later]]></title><description><![CDATA[<p>New KEV added <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f6a8.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--rotating_light" style="height:23px;width:auto;vertical-align:middle" title="🚨" alt="🚨" /><br />CVE-2026-34197 (Apache ActiveMQ)<br />• Active exploitation confirmed<br />• High-risk entry point<br />KEV = patch now, not later</p><p>Source: <a href="https://www.cisa.gov/news-events/alerts/2026/04/16/cisa-adds-one-known-exploited-vulnerability-catalog" rel="nofollow noopener"><span>https://www.</span><span>cisa.gov/news-events/alerts/20</span><span>26/04/16/cisa-adds-one-known-exploited-vulnerability-catalog</span></a></p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4ac.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--speech_balloon" style="height:23px;width:auto;vertical-align:middle" title="💬" alt="💬" /> How fast is your patch cycle?<br />Follow <span><a href="/user/technadu%40infosec.exchange">@<span>technadu</span></a></span> </p><p><a href="https://infosec.exchange/tags/InfoSec" rel="tag">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" rel="tag">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/KEV" rel="tag">#<span>KEV</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/419/665/689/642/269/original/3c0b1329c474a908.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/b89f931f-fb8f-4135-b797-45445f3f3a3c/new-kev-added-cve-2026-34197-apache-activemq-active-exploitation-confirmed-high-risk-entry-pointkev-patch-now-not-later</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 07:12:43 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/b89f931f-fb8f-4135-b797-45445f3f3a3c.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 17 Apr 2026 10:52:12 GMT</pubDate><ttl>60</ttl></channel></rss>